Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
600s -
max time network
490s -
platform
windows11-21h2_x64 -
resource
win11-20240221-en -
resource tags
arch:x64arch:x86image:win11-20240221-enlocale:en-usos:windows11-21h2-x64system -
submitted
09/04/2024, 14:58
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://cdn.discordapp.com/attachments/1162059878408405203/1162060587187052564/x_updated.rar?ex=662146c2&is=660ed1c2&hm=3a32b6fa0b4742e659dd032b34c79e9f146b5e469dbdfed1982f355993a7716f&
Resource
win11-20240221-en
General
-
Target
https://cdn.discordapp.com/attachments/1162059878408405203/1162060587187052564/x_updated.rar?ex=662146c2&is=660ed1c2&hm=3a32b6fa0b4742e659dd032b34c79e9f146b5e469dbdfed1982f355993a7716f&
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133571499978512223" chrome.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\Downloads\x_updated.rar:Zone.Identifier chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2916 chrome.exe 2916 chrome.exe 4672 chrome.exe 4672 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2916 chrome.exe 2916 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2916 chrome.exe Token: SeCreatePagefilePrivilege 2916 chrome.exe Token: SeShutdownPrivilege 2916 chrome.exe Token: SeCreatePagefilePrivilege 2916 chrome.exe Token: SeShutdownPrivilege 2916 chrome.exe Token: SeCreatePagefilePrivilege 2916 chrome.exe Token: SeShutdownPrivilege 2916 chrome.exe Token: SeCreatePagefilePrivilege 2916 chrome.exe Token: SeShutdownPrivilege 2916 chrome.exe Token: SeCreatePagefilePrivilege 2916 chrome.exe Token: SeShutdownPrivilege 2916 chrome.exe Token: SeCreatePagefilePrivilege 2916 chrome.exe Token: SeShutdownPrivilege 2916 chrome.exe Token: SeCreatePagefilePrivilege 2916 chrome.exe Token: SeShutdownPrivilege 2916 chrome.exe Token: SeCreatePagefilePrivilege 2916 chrome.exe Token: SeShutdownPrivilege 2916 chrome.exe Token: SeCreatePagefilePrivilege 2916 chrome.exe Token: SeShutdownPrivilege 2916 chrome.exe Token: SeCreatePagefilePrivilege 2916 chrome.exe Token: SeShutdownPrivilege 2916 chrome.exe Token: SeCreatePagefilePrivilege 2916 chrome.exe Token: SeShutdownPrivilege 2916 chrome.exe Token: SeCreatePagefilePrivilege 2916 chrome.exe Token: SeShutdownPrivilege 2916 chrome.exe Token: SeCreatePagefilePrivilege 2916 chrome.exe Token: SeShutdownPrivilege 2916 chrome.exe Token: SeCreatePagefilePrivilege 2916 chrome.exe Token: SeShutdownPrivilege 2916 chrome.exe Token: SeCreatePagefilePrivilege 2916 chrome.exe Token: SeShutdownPrivilege 2916 chrome.exe Token: SeCreatePagefilePrivilege 2916 chrome.exe Token: SeShutdownPrivilege 2916 chrome.exe Token: SeCreatePagefilePrivilege 2916 chrome.exe Token: SeShutdownPrivilege 2916 chrome.exe Token: SeCreatePagefilePrivilege 2916 chrome.exe Token: SeShutdownPrivilege 2916 chrome.exe Token: SeCreatePagefilePrivilege 2916 chrome.exe Token: SeShutdownPrivilege 2916 chrome.exe Token: SeCreatePagefilePrivilege 2916 chrome.exe Token: SeShutdownPrivilege 2916 chrome.exe Token: SeCreatePagefilePrivilege 2916 chrome.exe Token: SeShutdownPrivilege 2916 chrome.exe Token: SeCreatePagefilePrivilege 2916 chrome.exe Token: SeShutdownPrivilege 2916 chrome.exe Token: SeCreatePagefilePrivilege 2916 chrome.exe Token: SeShutdownPrivilege 2916 chrome.exe Token: SeCreatePagefilePrivilege 2916 chrome.exe Token: SeShutdownPrivilege 2916 chrome.exe Token: SeCreatePagefilePrivilege 2916 chrome.exe Token: SeShutdownPrivilege 2916 chrome.exe Token: SeCreatePagefilePrivilege 2916 chrome.exe Token: SeShutdownPrivilege 2916 chrome.exe Token: SeCreatePagefilePrivilege 2916 chrome.exe Token: SeShutdownPrivilege 2916 chrome.exe Token: SeCreatePagefilePrivilege 2916 chrome.exe Token: SeShutdownPrivilege 2916 chrome.exe Token: SeCreatePagefilePrivilege 2916 chrome.exe Token: SeShutdownPrivilege 2916 chrome.exe Token: SeCreatePagefilePrivilege 2916 chrome.exe Token: SeShutdownPrivilege 2916 chrome.exe Token: SeCreatePagefilePrivilege 2916 chrome.exe Token: SeShutdownPrivilege 2916 chrome.exe Token: SeCreatePagefilePrivilege 2916 chrome.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2916 wrote to memory of 4800 2916 chrome.exe 79 PID 2916 wrote to memory of 4800 2916 chrome.exe 79 PID 2916 wrote to memory of 1068 2916 chrome.exe 81 PID 2916 wrote to memory of 1068 2916 chrome.exe 81 PID 2916 wrote to memory of 1068 2916 chrome.exe 81 PID 2916 wrote to memory of 1068 2916 chrome.exe 81 PID 2916 wrote to memory of 1068 2916 chrome.exe 81 PID 2916 wrote to memory of 1068 2916 chrome.exe 81 PID 2916 wrote to memory of 1068 2916 chrome.exe 81 PID 2916 wrote to memory of 1068 2916 chrome.exe 81 PID 2916 wrote to memory of 1068 2916 chrome.exe 81 PID 2916 wrote to memory of 1068 2916 chrome.exe 81 PID 2916 wrote to memory of 1068 2916 chrome.exe 81 PID 2916 wrote to memory of 1068 2916 chrome.exe 81 PID 2916 wrote to memory of 1068 2916 chrome.exe 81 PID 2916 wrote to memory of 1068 2916 chrome.exe 81 PID 2916 wrote to memory of 1068 2916 chrome.exe 81 PID 2916 wrote to memory of 1068 2916 chrome.exe 81 PID 2916 wrote to memory of 1068 2916 chrome.exe 81 PID 2916 wrote to memory of 1068 2916 chrome.exe 81 PID 2916 wrote to memory of 1068 2916 chrome.exe 81 PID 2916 wrote to memory of 1068 2916 chrome.exe 81 PID 2916 wrote to memory of 1068 2916 chrome.exe 81 PID 2916 wrote to memory of 1068 2916 chrome.exe 81 PID 2916 wrote to memory of 1068 2916 chrome.exe 81 PID 2916 wrote to memory of 1068 2916 chrome.exe 81 PID 2916 wrote to memory of 1068 2916 chrome.exe 81 PID 2916 wrote to memory of 1068 2916 chrome.exe 81 PID 2916 wrote to memory of 1068 2916 chrome.exe 81 PID 2916 wrote to memory of 1068 2916 chrome.exe 81 PID 2916 wrote to memory of 1068 2916 chrome.exe 81 PID 2916 wrote to memory of 1068 2916 chrome.exe 81 PID 2916 wrote to memory of 1068 2916 chrome.exe 81 PID 2916 wrote to memory of 1068 2916 chrome.exe 81 PID 2916 wrote to memory of 1068 2916 chrome.exe 81 PID 2916 wrote to memory of 1068 2916 chrome.exe 81 PID 2916 wrote to memory of 1068 2916 chrome.exe 81 PID 2916 wrote to memory of 1068 2916 chrome.exe 81 PID 2916 wrote to memory of 1068 2916 chrome.exe 81 PID 2916 wrote to memory of 1068 2916 chrome.exe 81 PID 2916 wrote to memory of 1036 2916 chrome.exe 82 PID 2916 wrote to memory of 1036 2916 chrome.exe 82 PID 2916 wrote to memory of 960 2916 chrome.exe 83 PID 2916 wrote to memory of 960 2916 chrome.exe 83 PID 2916 wrote to memory of 960 2916 chrome.exe 83 PID 2916 wrote to memory of 960 2916 chrome.exe 83 PID 2916 wrote to memory of 960 2916 chrome.exe 83 PID 2916 wrote to memory of 960 2916 chrome.exe 83 PID 2916 wrote to memory of 960 2916 chrome.exe 83 PID 2916 wrote to memory of 960 2916 chrome.exe 83 PID 2916 wrote to memory of 960 2916 chrome.exe 83 PID 2916 wrote to memory of 960 2916 chrome.exe 83 PID 2916 wrote to memory of 960 2916 chrome.exe 83 PID 2916 wrote to memory of 960 2916 chrome.exe 83 PID 2916 wrote to memory of 960 2916 chrome.exe 83 PID 2916 wrote to memory of 960 2916 chrome.exe 83 PID 2916 wrote to memory of 960 2916 chrome.exe 83 PID 2916 wrote to memory of 960 2916 chrome.exe 83 PID 2916 wrote to memory of 960 2916 chrome.exe 83 PID 2916 wrote to memory of 960 2916 chrome.exe 83 PID 2916 wrote to memory of 960 2916 chrome.exe 83 PID 2916 wrote to memory of 960 2916 chrome.exe 83 PID 2916 wrote to memory of 960 2916 chrome.exe 83 PID 2916 wrote to memory of 960 2916 chrome.exe 83
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://cdn.discordapp.com/attachments/1162059878408405203/1162060587187052564/x_updated.rar?ex=662146c2&is=660ed1c2&hm=3a32b6fa0b4742e659dd032b34c79e9f146b5e469dbdfed1982f355993a7716f&1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffafa749758,0x7ffafa749768,0x7ffafa7497782⤵PID:4800
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1680 --field-trial-handle=1816,i,1317219944943631161,16747625810987629416,131072 /prefetch:22⤵PID:1068
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2092 --field-trial-handle=1816,i,1317219944943631161,16747625810987629416,131072 /prefetch:82⤵PID:1036
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2160 --field-trial-handle=1816,i,1317219944943631161,16747625810987629416,131072 /prefetch:82⤵PID:960
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2756 --field-trial-handle=1816,i,1317219944943631161,16747625810987629416,131072 /prefetch:12⤵PID:1924
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2764 --field-trial-handle=1816,i,1317219944943631161,16747625810987629416,131072 /prefetch:12⤵PID:716
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4968 --field-trial-handle=1816,i,1317219944943631161,16747625810987629416,131072 /prefetch:82⤵PID:840
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5324 --field-trial-handle=1816,i,1317219944943631161,16747625810987629416,131072 /prefetch:82⤵PID:1800
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4660 --field-trial-handle=1816,i,1317219944943631161,16747625810987629416,131072 /prefetch:82⤵
- NTFS ADS
PID:2212
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=980 --field-trial-handle=1816,i,1317219944943631161,16747625810987629416,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4672
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4636
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
870B
MD513408e2c1a54e9d1959fa0bfdd23fe8d
SHA1ec33a4e40898eb1e28cf184556e3f2298438a62a
SHA256c7942e010dd97a4a56812b5dfc48d067e92f360b4a583cf4b1b06df314178ad9
SHA51283f972dbc312dcea049315bf944b95d2291486cf3bfe036edeed77748f81fb245957c81a23697a20ceddff598baf3ef0253a74b194891ad8a029e85ad0d596af
-
Filesize
6KB
MD522ce1dcfdb502d13fb7cb5303d2766c7
SHA153bf821d6727fae3c2a0f0bca5d6a91bed8629aa
SHA25676d5fa278b04b8e06df4af0a0a7e641f704659557abe291cbda4f94f12060a1a
SHA512a028909fe8e25cbdf7da8b7407f5ab0aa22cdafe5a50aaaf3fda7e29870bdc2225849fe83ab014fbefecc18a9b98a6de4d35b2c1a4d99cf4e43abb1d48ae1bd8
-
Filesize
6KB
MD5eecb34958222bad2b01e869fcfdaeb8d
SHA1fa144832e87fd2900e4204372f1d50124289e004
SHA256c91adbd4b59804ef8738d7518d7478512448593c0985b92f14804c731119f0ed
SHA51248389ae84c7d73585f8f096669d3d4ad3beadc1b265e76f80265515e1ca3730dc1199949f238b3b1d2b466fa3e4d87bc69cbff71ad375f082956943532cc81ad
-
Filesize
6KB
MD58064ab43db1edbd9197ec8e0fc6c54ac
SHA104e155fb7133790d4ad2efd2f424e722a29b0840
SHA256716825b9b4be75498ffbdbe2d8067181477054d56d6faa72ec68e2c09d460821
SHA512c9f978a69fa297487152eda0fd7115d5b5edba3606ee1fc22fb9ae11003d81f5fbf2e518554a099998c8bef1c26be6aa9f183cb0fd030ee3daeebe95dedb992e
-
Filesize
130KB
MD5a1cbb9db92552f55e5389a5d90c27531
SHA10b40636e8ecf1c939d25ecd11a30bfbdc33a306c
SHA256d8f1dfc6cb85c6ee7e5de40debbe8a3ae71122fdfb9ae164d8a2f069defa87d7
SHA512a6771ddf0a9a982faf4360bb2964453ab562e107de86b1be4c4a6e321fb5cd8a56051175dfa2627814aefeb2369a20c1371f9e1e9af298d480a8137679ca7cac
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
26B
MD5fbccf14d504b7b2dbcb5a5bda75bd93b
SHA1d59fc84cdd5217c6cf74785703655f78da6b582b
SHA256eacd09517ce90d34ba562171d15ac40d302f0e691b439f91be1b6406e25f5913
SHA512aa1d2b1ea3c9de3ccadb319d4e3e3276a2f27dd1a5244fe72de2b6f94083dddc762480482c5c2e53f803cd9e3973ddefc68966f974e124307b5043e654443b98